Kumar V. Mangipudi

Learn More
Anonymity is a desirable security feature in addition to providing user identification and key agreement during a user’s login process. Recently, Yang et al., proposed an efficient user identification and key distribution protocol while preserving user anonymity. Their protocol addresses a weakness in the protocol proposed by Wu and Hsu. Unfortunately,(More)
Anonymity is a very important security feature in addition to authentication and key agreement features in communication protocols. In this paper, we propose two authentication and key agreement (AKA) protocols: the AKA protocol with user anonymity (UAP) and the AKA protocol with user and server anonymity (USAP). The proposed protocols have the following(More)
Password authentication protocols range from complex public-key cryptosystems to simple hash-based password authentication schemes. One common feature of these protocols is that the user’s identity is transmitted in plain during the authentication process, which allows an attacker to monitor the user’s activities. In many cases, the user’s anonymity is a(More)
Aydos, Savas and Koç proposed a wireless authentication and key agreement protocol (ASK-WAP) based on Elliptic Curve Cryptography (ECC). We find that this protocol is vulnerable to a man-in-the-middle attack, a denial-of-service attack and an impersonation attack. In this paper, we present the above mentioned attacks on the ASK-WAP. We also propose a(More)
Security assurance is a rapidly evolving but well understood discipline in the software industry. Many firms have adopted the Security Development Lifecycle as a process to identify and fix vulnerabilities in their products before they are released. To do this, they rely on sound software security practices, tools and precise technical information available(More)
  • 1